User guide

Table of Contents
Table of Contents v
Renaming an Adapter.............................................................................. 28
Removing an Adapter..............................................................................28
Removing an Adapter Using the Adapter Dialog. .............................. 28
Removing an Adapter Using the Sidebar Icon. ..................................28
Connecting to a Network ...............................................................................29
Selecting an Adapter................................................................................29
Connecting to a Network .........................................................................30
Connecting to a Wireless Network ....................................................30
Connecting to a Wired Network ........................................................30
Configuring Multiple Simultaneous Network Connections........................ 31
Disconnecting from a Network ................................................................31
Scanning for Wireless Networks .............................................................. 31
Reconnecting to a Network .....................................................................32
Reauthenticating a Network Connection..................................................32
Checking Adapter Status..........................................................................32
Connection Status ............................................................................. 34
Interaction with Other Adapter Software........................................................35
Chapter 5
Managing Profiles 37
Adding or Modifying a Profile ........................................................................ 38
Specifying Profile Names.........................................................................39
Specifying User Info.......................................................................................39
Specifying a Login Name .........................................................................39
Setting Passwords....................................................................................40
Using Certificates..................................................................................... 41
Using Certificates for Authentication .................................................42
Using Soft Tokens....................................................................................42
Enabling Soft Token Identification ....................................................43
Using SIM Cards (EE and EF only) ...........................................................43
Setting a SIM Card ID ........................................................................ 43
Managing PIN Settings ...................................................................... 44
Configuring EAP-SIM Identity ............................................................44
Setting Up Authentication .............................................................................. 44
Selecting Authentication Protocols........................................................... 45
Validating a Server Certificate—Mutual Authentication............................46
Setting Tunneled Token Card Credential Options ....................................46
Setting an Anonymous Name .................................................................. 47
TTLS Settings .................................................................................................48
Selecting an Inner Authentication Protocol ..............................................48
EAP as an Inner Authentication Protocol .................................................50
Using Certificates with EAP-TTLS Authentication .....................................50
PEAP Settings.................................................................................................51
Using Certificates with EAP-PEAP Authentication ....................................52
EAP-POTP Run-Time Dialogs ......................................................................... 52
Configuring EAP-POTP as an Inner Authentication Method ..................... 52
Infranet Controller Profile Configuration—UAC Networks Only......................53
Setting JUAC as an Inner Authentication Protocol for TTLS ......................53
Setting JUAC as an Inner Authentication Protocol for PEAP .....................54
Setting the Preferred Realm and Role...................................................... 55
Authenticating with Token Cards.............................................................55
Removing a Profile......................................................................................... 55
Sample Profile Configuration ......................................................................... 56